For the connoisseurs of French cuisine, the word ‘Quenelle’ is known.
It is a dish made from minced fish, chicken or meat cooked in water in the form of an oval dumpling.
In fact, the French word derived from the (German) word dumplings.
This article is not about the ‘haute cuisine’ but the explanation why the word ‘Quenelle’ has got a different meaning in France.
It is the expression for ‘f**k you’ or ‘Stick it in your ass’.
Sounds vulgar but is meant as an expression of protest against the elite.
There is also a hand sign and this could become a worldwide symbol of the uprising.
The Quenelle is shown in which you stretch your arm straight down indicating with the other one as the measure of the length.
The higher the hand, the longer the measure, the stronger is the symbolic expression of protest.
This new meaning has invented the popular French comedian originally from Cameroon Donne Dieudonné or ‘Dieudo’ as he is known in France.
Meanwhile, the character has become very popular with the French, and is exploited ubiquitously is used for ‘f**k the system’, ‘the state can kiss my ass’ or ‘plug it in your ass, Mr. President’.
The symbolism has become so popular, the French regime of Hollande is panicking and has taken measures to suppress the symbolism and even prohibit.
The gesture is treated in their eyes as the Hitler salute.
Nevertheless, it is shown at every opportunity.
For example, when the French interior minister and upper Zionist Manuel Valls allowed to take a picture with a group of young people.
Unbeknownst to him, the teenagers showed the Quenelle and so what they think of him.
It has become a sport in France, to approach known politicians to stand next to them, show the Quenelle and to be photographed.
Especially the young French show the quenelle at every opportunity, especially when they are photographed next to the officials of the dictatorship.
The photos will then land on the Internet as an expression of protest.
We know that France is under the total control of the global financial elite and the population is completely robbed of them.
The Quenelle is mainly directed against the Globalized Banking Industrial Complex.
Therefore, the organization against racism and anti-Semitism has described the Quenelle as ‘reverse Nazi greeting’.
Really, they did.
Therefore clearly has crooked-laughed the whole French Internet community.
The regime is not amused and reacted with paranoia, as you would expect from a dictator like Stalin.
They have started a witch hunt and search for hidden ‘quenelles’ everywhere.
If the gesture is detected, especially among civil servants, police or military, then they will be punished.
Of course, this persecution has triggered a flood of photos on the Internet with people showing the Quenelle as resistance to the regime.
‘Dieudo‘, the inventor of the quenelles, was of course banned from all public appearances on French television and is heavily censored, pelted with mud and slandered.
But his stage performances as a comedian are more popular than ever and he has invited uniformed official in his theatre in Paris, so they perform with him together the quenelle.
The photos are published On his website.
We’re now in a frustrating situation, how can we make a ‘regime change in this so-called democracy (laughing), which is completely corrupted, controlled and paid by the moneyed elite and the corporations ?
The ‘Classe politique’ for long not represents our interests.
Millions of people in all Western industrialized countries are totally disgusted with the encrusted power structure because they see no realistic way to change something.
It remains only scorn and derision left.
The only ones who are still ‘listening’ (laughing) are the SS, the Secret Services by their mass spying and eavesdropping of all our communications.
Hello slouch hats read along now:
What are you !
Sausages with small cocks !
Shame on you, you traitors to humanity.
How can you have such a crap job ?
We make a quenelle action.
Send me your resistance sign as you take pictures next to any representative of the regime or before its institutions.
Maybe we should take this new protest gesture outside France, because somehow we have to express the resistance of public and ourselves recognize mutually.
According to recent Nielsen statistics 56% of the households in the US own a video game console. Unbeknownst to many Americans this can be an open invitation to let big brother into your house.
Disguised as a video game add-on, Microsoft’s Kinect is the all seeing eye that sits on top of your TV watching your every move, listening to every conversation and even monitoring vital health information.
Now imagine if the Government went door to door and wanted to put a black box on top of your TV (and I’m not talking about your cable box) that did the same things, hopefully you would tell them hell no and immediately get out of your house.
But since the Kinect is disguised as entertainment most people will gladly accept it.
Below are some eye opening facts and quotes to think about before you make that purchase this fall.
Kinect will monitor the number of viewers in a room and check to see if the number of occupants exceeded a certain threshold set by the content provider. If there are too many warm bodies present, the device owner would be prompted to purchase a license for a greater number of viewers.
Coupled with the Xbox One, Kinect will now be able to hear and understand two people talking at once,, even detecting whether mouths are open in a dark room.
Inside the new Kinect 2 will be a high-resolution camera and a high-fidelity microphone, and gamers have already trashed Microsoft for the potential Kinect 2 has for peering into homes.
The new Kinect can see in the dark, pick out human voices in a noisy living room and read your heart rate just by looking at your face. It was unveiled by Microsoft last week as a fixture of the fall-releasing Xbox One. The thing has to be plugged in for the console to work, and is in some way already checking out what’s going on in the room it’s in.
Microsoft is actually trying to integrate Kinect into the classroom, sold as a learning tool Kinect will continue to spy on your child all day in school and at home.
Developed by PrimeSense, Kinect can interpret specific gestures – allowing for true hands-free control using infrared sensors, a camera and microchip to track the movement of individuals in a 3D space. While not confirmed, some experts suggest PrimeSense’s technology was used to train soldiers.
The new capabilities work alongside improvements to Kinect that allow it to track thumbs, 25 joints of up to six people, and heart rates by scanning a face. While the multiplayer gaming applications for multiple voice processing are obvious, Microsoft is also aiming its Xbox One console firmly for TV and entertainment.
After reading all the capabilities the Kinect has we all know this personal information would never be accessed by our loving Government without a warrant, or be passed on to the FBI, CIA or DEA to be scrutinized in America’s secret courts.
vPro processors allow remote access even when computer is turned off
Intel Core vPro processors contain a “secret” 3G chip that allows remote disabling and backdoor access to any computer even when it is turned off.
Although the technology has actually been around for a while, the attendant privacy concerns are only just being aired. The “secret” 3G chip that Intel added to its processors in 2011 caused little consternation until the NSA spying issue exploded earlier this year as a result of Edward Snowden’s revelations.
In a promotional video for the technology, Intel brags that the chips actually offer enhanced security because they don’t require computers to be “powered on” and allow problems to be fixed remotely. The promo also highlights the ability for an administrator to shut down PCs remotely “even if the PC is not connected to the network,” as well as the ability to bypass hard drive encryption.
“Intel actually embedded the 3G radio chip in order to enable its Anti Theft 3.0 technology. And since that technology is found on every Core i3/i5/i7 CPU after Sandy Bridge, that means a lot of CPUs, not just new vPro, might have a secret 3G connection nobody knew about until now,” reports Softpedia.
Jeff Marek, director of business client engineering for Intel, acknowledged that the company’s Sandy Bridge” microprocessor, which was released in 2011, had “the ability to remotely kill and restore a lost or stolen PC via 3G.”
“Core vPro processors contain a second physical processor embedded within the main processor which has it’s own operating system embedded on the chip itself,” writes Jim Stone. “As long as the power supply is available and in working condition, it can be woken up by the Core vPro processor, which runs on the system’s phantom power and is able to quietly turn individual hardware components on and access anything on them.”
As Apple slave goods continue to dominate every corner of the technological market, there are more and more reasons surfacing as to why consumers should not support this company.
If that doesn’t stop you right there, perhaps you should take a look at the inhumane working conditions inside their Chinese factories that now come equipped with suicide nets to prevent workers from jumping to their death.
I could go on and on about all the terrible practices Apple institutes on both sides of the coin, but the one that is most disturbing is Apple’s assault on basic human rights. I would categorize the ability to use my phone’s camera for pictures and video recording as a basic human right.
This will be drastically regulated in the near future with the institution of U.S. Patent No. 8,254,902 better known as “apparatus and methods for enforcement of policies upon a wireless device.” The patent granted in August 2012 gives Governments, businesses, and network owners the right to disable your camera, wi-fi and video capabilities on an iPhone for any reason, at any time. Apple, being the sneaky innovators they are, will pre-package this application into the phones and most likely all other mobile products in the future.
Interview with NSA Whistleblower Russ Tice
Would you be willing to give up what Edward Snowden has given up? He has given up his high paying job, his home, his girlfriend, his family, his future and his freedom just to expose the monolithic spy machinery that the U.S. government has been secretly building to the world. He says that he does not want to live in a world where there isn’t any privacy. He says that he does not want to live in a world where everything that he says and does is recorded. Thanks to Snowden, we now know that the U.S. government has been spying on us to a degree that most people would have never even dared to imagine. Up until now, the general public has known very little about the U.S. government spy grid that knows almost everything about us.
But making this information public is going to cost Edward Snowden everything. Essentially, his previous life is now totally over. And if the U.S. government gets their hands on him, he will be very fortunate if he only has to spend the next several decades rotting in some horrible prison somewhere. There is a reason why government whistleblowers are so rare. And most Americans are so apathetic that they wouldn’t even give up watching their favorite television show for a single evening to do something good for society. Most Americans never even try to make a difference because they do not believe that it will benefit them personally. Meanwhile, our society continues to fall apart all around us. Hopefully the great sacrifice that Edward Snowden has made will not be in vain. Hopefully people will carefully consider what he has tried to share with the world. The following are 27 quotes from Edward Snowden about U.S. government spying that should send a chill up your spine…
#1 “The majority of people in developed countries spend at least some time interacting with the Internet, and Governments are abusing that necessity in secret to extend their powers beyond what is necessary and appropriate.”
#2 “…I believe that at this point in history, the greatest danger to our freedom and way of life comes from the reasonable fear of omniscient State powers kept in check by nothing more than policy documents.”
#3 “The government has granted itself power it is not entitled to. There is no public oversight. The result is people like myself have the latitude to go further than they are allowed to.”
#4 “…I can’t in good conscience allow the US government to destroy privacy, internet freedom and basic liberties for people around the world with this massive surveillance machine they’re secretly building.”
#5 “The NSA has built an infrastructure that allows it to intercept almost everything.”
#6 “With this capability, the vast majority of human communications are automatically ingested without targeting. If I wanted to see your e-mails or your wife’s phone, all I have to do is use intercepts. I can get your e-mails, passwords, phone records, credit cards.”
#7 “Any analyst at any time can target anyone. Any selector, anywhere… I, sitting at my desk, certainly had the authorities to wiretap anyone, from you or your accountant, to a federal judge, to even the President…”
#8 “To do that, the NSA specifically targets the communications of everyone. It ingests them by default. It collects them in its system and it filters them and it analyzes them and it measures them and it stores them for periods of time simply because that’s the easiest, most efficient and most valuable way to achieve these ends. So while they may be intending to target someone associated with a foreign government, or someone that they suspect of terrorism, they are collecting YOUR communications to do so.”
The National Security Agency h as obtained direct access to the systems of Google, Facebook, Apple and other US internet giants, according to a top secret document obtained by the Guardian.
The NSA access is part of a previously undisclosed program called PRISM, which allows officials to collect material including search history, the content of emails, file transfers and live chats, the document says.
The Guardian has verified the authenticity of the document, a 41-slide PowerPoint presentation – classified as top secret with no distribution to foreign allies – which was apparently used to train intelligence operatives on the capabilities of the program. The document claims “collection directly from the servers” of major US service providers.
Although the presentation claims the program is run with the assistance of the companies, all those who responded to a Guardian request for comment on Thursday denied knowledge of any such program.
In a statement, Google said:
“Google cares deeply about the security of our users’ data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a back door for the government to access private user data.”
Several senior tech executives insisted that they had no knowledge of PRISM or of any similar scheme. They said they would never have been involved in such a program. “If they are doing this, they are doing it without our knowledge,” one said.
An Apple spokesman said it had “never heard” of PRISM.
The NSA access was enabled by changes to US surveillance law introduced under President Bush and renewed under Obama in December 2012.
The program facilitates extensive, in-depth surveillance on live communications and stored information. The law allows for the targeting of any customers of participating firms who live outside the US, or those Americans whose communications include people outside the US.
It also opens the possibility of communications made entirely within the US being collected without warrants.
Disclosure of the PRISM program follows a leak to the Guardian on Wednesday of a top-secret court order compelling telecoms provider Verizon to turn over the telephone records of millions of US customers.
The participation of the internet companies in PRISM will add to the debate, ignited by the Verizon revelation, about the scale of surveillance by the intelligence services. Unlike the collection of those call records, this surveillance can include the content of communications and not just the metadata.
Some of the world’s largest internet brands are claimed to be part of the information-sharing program since its introduction in 2007. Microsoft – which is currently running an advertising campaign with the slogan “Your privacy is our priority” – was the first, with collection beginning in December 2007.
It was followed by Yahoo in 2008; Google, Facebook and PalTalk in 2009; YouTube in 2010; Skype and AOL in 2011; and finally Apple, which joined the program in 2012. The program is continuing to expand, with other providers due to come online.
Collectively, the companies cover the vast majority of online email, search, video and communications networks.
Read more Here
[EDITOR'S NOTE: There's a New BIG BROTHER in Town, and his name is BARRY OBAMA]
The Obama administration overruled recommendations from within the US Department of Homeland Security and implemented new guidelines earlier this year that allow the government to gather and analyze intelligence on every single US citizen.
Since the spring, a little-know intelligence agency outside of Washington, DC has been able to circumvent the Fourth Amendment to the US Constitution and conduct dragnet surveillance of the entire country, combing massive datasets using advanced algorithms to search and seize personal info on anyone this wish, reports the Wall Street Journal this week.
There’s no safeguard that says only Americans with criminal records are the ones included, and it’s not just suspected terrorists that are considered in the searches either. The National Counterterrorism Center (NCTC) has been provided with entire government databases and given nearly endless access to intelligence on everyone in the country, regardless of whether or not they’ve done anything that would have made them a person of interest. As long as data is “reasonably believed” to contain “terrorism information,” the agency can do as they wish.
What’s more is the NCTC can retain that information for years, reviewing it whenever they’d like to take a look.